firewall architectures -...

114
Firewall Architectures Mason Harris CCIE # 5916 Solutions Architect [email protected] BRKSEC-2021

Upload: truongmien

Post on 16-Mar-2018

239 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Firewall Architectures

Mason Harris CCIE # 5916

Solutions [email protected]

BRKSEC-2021

Page 2: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Your Speaker

Mason Harris CCIE #5916

[email protected]

Solutions Architect

15 years at Cisco

10th Year as a Cisco Live Speaker

@mason_harris

Page 3: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Cisco ASA Sessions: Building Blocks

BRKSEC-2020

Firewall Deployment

(Mon 10:00)

BRKSEC-2021

Firewall Architectures

(Wed 08:00)

BRKSEC-3032

ASA Clustering Deep Dive

(Th 10:00)

BRKSEC-3021

Maximizing Firewall Performance

(Tue 08:00)

BRKSEC-2028

Deploying NG Firewall

(Mon 08:00)

(Th 13:00)

Page 4: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

• Introduction

• Deployment Modes

• Routing on the ASA

• Firewall Virtualization

• ASA High Availability

• Advanced ASA Deployments

• Summary

Agenda

Page 5: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

INTRODUCTION

Page 6: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Introduction – What is Firewall Architecture?

• Deploying any firewall means a consideration of the surrounding network and the reasons for deploying a firewall

• This session will focus on different ways Cisco firewalls are deployed

• Cisco firewalls can be physical or virtual or a combination of both

• Best practices and gotchas/caveats will be shared and discussed

• This session does not cover IOS firewall, Firewall Services Module (FWSM) or ASA Next Generation Firewall (FirePOWER services)

• Please ask questions, we’ll be moving fast

Page 7: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

PHYSICAL FIREWALLS

Page 8: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Physical Firewalls: Service Modules and Appliances

• Cisco currently only has one service module firewall, the ASA SM for the Catalyst 6500-E

• SM firewalls have no physical interfaces and rely entirely on the existing switching infrastructure for packet flow

• Uses VLANs to redirect which packets are inspected or bypassed

• Appliance firewalls can be deployed in more places in the network but require physical cabling

• Additional services are available (e.g. remote access VPN) on physical firewalls that don’t exist on blade firewalls

• ASA SM and ASA appliances run same code and have same features (mostly)

Page 9: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Physical Firewalls: ASA Service Module

• Supported on Catalyst 6500-E and 7600

• Treat as an external “firewall on a stick”

• Critical design around SVI placement for L3

• Up to 4 modules in one chassis

• Completely based on ASA5585-X architecture with full feature parity

• VPN is supported with ASA 9.0(1)+, ASA clustering is not supported

Page 10: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Physical Firewalls: ASA 5585 Appliances• 2 slots (2 RU): FW+FW, FW+NGIPS (FirePOWER on ASA), or I/O Expansion card

• Top end 5585s provide 4 10GE ports (SFP)

• I/O card(s) can add up to 20 10GE ports

• 20 GBps multiprotocol per appliance (5585-60)

• 10 million connections per appliance (5585-60)

• 2 5585s can be stacked in one chassis as shown above

Page 11: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

DEPLOYMENT MODES

Page 12: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Firewall Design: Modes of Operation

• Routed Mode is the traditional mode of the firewall. Two or more interfaces that separate L3 domains

• Transparent Mode is where the firewall acts as a bridge functioning mostly at L2

• Multi-context mode involves the use of virtual firewalls, which can be either routed or transparent mode

• Mixed mode is the concept of using virtualization to combine routed and transparent mode virtual firewalls (ASA 9.0+)

Page 13: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

What is a Transparent mode Firewall?

• Transparent Firewall (L2) mode provides an option in environments where existing services can’t be sent through the firewall at L3

• Very popular mode in data center environments

• In L2 mode:

• Routing protocols can establish adjacencies through the firewall

• Protocols such as HSRP, IPSEC, GLBP can pass with ACL

• Multicast streams can traverse the firewall

• Non-IP traffic can be allowed (IPX, MPLS, BPDUs)

• NO dynamic routing protocol support or VPN support

• Specific design requirements, reference Configuration Guide for details:http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/products-installation-and-configuration-guides-list.html

Page 14: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

How Does Transparent Mode Work?

• Firewall functions like a bridge (“bump in the wire”) at L2, only ARP packets pass without an explicit ACL

• Still can use traditional layer 4-7 ACLs on the firewall

• Does not forward Cisco Discovery Protocol (CDP)

• Service modules are supported, multi-context mode is supported

• Same subnet exists on all interfaces in the bridge-group

• Different VLANs on inside and outside interfaces

• In addition to Extended ACLs, use an EtherType ACL to restrict or allow L2 protocols

Page 15: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Transparent Mode Requirements

• Uses logical entities called bridge-groups to segment traffic, each has 1 BVI

• A BVI (Bridged Virtual Interface) address is required for both management and for traffic to pass through the transparent firewall

• Up to 4 interfaces are permitted per bridge-group (inside, outside, DMZ1, DMZ2)

• Up to 250 bridge-groups (9.3), prior releases limited to 8

• Best Practice: Always set default gateways of hosts to L3 on far side of firewall, NOT the management IP of firewall

• In multi-context mode an interface can not be shared among contexts (virtual firewalls)

Page 16: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

10.1.1.0 /24 – vlan 10

10.1.1.0 /24 – vlan 20

BVI 1: 10.1.1.100 /24

(Bridge Virtual Interface)

firewall transparent

hostname ciscoasa

!

interface GigabitEthernet0/0

vlan 20

nameif outside

security-level 0

bridge-group 1

!

interface GigabitEthernet0/1

vlan 10

nameif inside

security-level 100

bridge-group 1

!

interface BVI1

ip address 10.1.1.100 255.255.255.0

Transparent Mode Configuration (2 interfaces)

Samesubnet

on both!

Brid

ge

-gro

up

1

Page 17: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Firewall - Routed Mode

10.1.1.1 - inside

10.99.1.1 - outside

10.99.1.0 /24

10.1.1.0 /24

hostname ciscoasa

!

interface GigabitEthernet0/0

nameif outside

security-level 0

ip address 10.99.1.1 /24

!

interface GigabitEthernet0/1

nameif inside

security-level 100

ip address 10.1.1.1 /24

!

• Routed mode has a routing table, ASA operates at L3

• ASA can use routing protocols

Page 18: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ROUTING ON THE ASA

Page 19: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Routing and the ASA

• ASA IOS router, but has evolved over time to add more routing functions

• Understanding the Next Hop selection process on ASA is critical

• ASA supports EIGRP, OSPFv2/v3, RIP, BGP and PIM-SM

• Separate management routing table in 9.5(1) (July 2015)

• ASA supports floating static routes

• ASA Failover synchronizes routing table as part of state sync process

• ASA Clustering also syncs routing table but process depends on deployment

• Routing is supported in multi context mode; EIGRP and BGP can only have one instance per context while OSPF v2 can have up to two

Page 20: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Routing and the ASA – Continued – Proxy ARP

• Proxy ARP is used when a device responds to an ARP request with its own MAC address despite not “owning” that MAC address

• ASA has it on by default but requires “show run all” to see in configuration

• no sysopt noproxyarp <interface>

• Useful for NAT translations and other things where ASA is “hiding” the true identity of a service

• Many networks have suffered due to a misunderstanding of this command

• Excellent summary blog post by Paul Stewart: http://www.packetu.com/2011/11/07/the-asas-arp-behavior/

Page 21: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Non-Stop Forwarding (NSF) aka Graceful Restart

• Traditionally when a network device restarts, all routing peers associated with that device will remove the routes from that peer and update their routing table

• At scale this could create an unstable routing environment across multiple routing domains which is detrimental to overall network performance

• Modern dual processor systems solve this problem by restarting the control plane on one processor while continuing to forward traffic on the other

• For devices that support NSF, route removal and insertion caused by restarts is no longer necessary thus adding network stability

• Uses protcol extensions to allow network device a grace period in which traffic will continue to be forwarded via existing routes

Page 22: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Non-Stop Forwarding (NSF) on ASA (9.3)+

• Pre 9.3: Routing Information Base is replicated in A/S failover and Spanned Etherchannel clustering• Active unit or master establish dynamic routing adjacencies and keep standby and slaves up-

to-date

• When the active unit or master fails, the failover pair or cluster continue traffic forwarding based on RIB

• New active unit or master re-establish the dynamic routing adjacencies and update the RIB

• Adjacent routers flush routes upon adjacency re-establishment and cause momentary traffic black holing

• 9.3 and after: Non Stop Forwarding (NSF) / Graceful Restart (GR)• Cisco or IETF compatible for OSPFv2, OSPF3; RFC 4724 for BGPv4

• ASA notifies compatible peer routers after a switchover in failover or Spanned Etherchannel clustering

• ASA acts as a helper to support a graceful or unexpected restart of a peer router in all modes

Page 23: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Legacy Equal Cost Multi Path (ECMP) on ASA

• Supports up to 3 Equal Cost Multi Path (ECMP) routes on same interface

route outside 0 0 10.1.1.1

route outside 0 0 10.1.1.2

route outside 0 0 10.1.1.3

• Traffic is load-shared on outside interface across three gateways using a hash of source and destination addresses

• Not supported across different interfaces

10.1.1.1 10.1.1.310.1.1.2

outside

Page 24: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

New Feature – Interface Traffic Zones - 9.3+

• Assign multiple physical and/or logical interfaces to a Security Zone

• Same-prefix ECMP with up to 8 next hops across all interfaces in a zone; up to 256 zones maximum

• All interfaces must have same security level

• Seamless connection switchover to another egress interface in the same zone on failure but…NAT/PAT sessions will need to be re-established

• Helpful with assymetric routing and load-balancing deployments, Not supported for VPN, BTF, management or failover

outside1 outside2

inside 1 inside 2

Zone-In

Zone-Out

http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/interface-zones.html

Page 25: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Legacy Static Route Tracking via SLA

• Static routes are………um…..static

• ASA has had a tracking feature for many years to ensure that a next hop is up

• Does NOT load-balance; uses an active-standby model

route outside 0 0 10.1.1.1 1 track 1

route backup 0 0 10.2.2.1 254

sla monitor 23

type echo protocol ipIcmpEcho 192.168.1.100interface outside

sla monitor schedule 23 life forever start-time now

track 1 rtr 23 reachability

GW-A - Primary

outside

10.1.1.1 10.2.2.1

192.168.1.100

GW-B - Backup

Page 26: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

New 9.4+ Feature – Policy Based Routing (PBR)

• PBR effectively overrides the default behavior of the ASA routing table

• Similar in function to IOS feature; uses ACL for matching in a route-map

• Only supported in routed mode on ASA, also supported in ASA Clustering

• Supports QoS and next hop manipulation

• No match criteria implies a match “any”

• Traffic not matching line 10 or 20 is dropped by Null0 interface

route-map TEST permit 10

match ip address <acl>

set ip next-hop 10.1.1.1

route-map TEST permit 20

match ip address <acl>

set ip next-hop 10.2.2.1

route-map TEST permit 30

set interface Null0

Page 27: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

TRANSPARENT MODE:Architecture and Deployment

Page 28: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA L2 FW: ASA between Hosts and Gateway

• ASAs in transparent mode with upstream L3 gateway

• Server gateway on outside/untrusted side of firewall

• Firewall is L2 adjacent and in path to hosts

• Segmentation through VLAN assignment

Vlan 10

(Trusted/Inside)

vlan 20 VIP: 10.1.1.254

Local

Gateway

Hosts: 10.1.1.1-99

10.1.1.x /24

Vlan 20

(Untrusted/Outside)

ASA BVI: 10.1.1.100

Page 29: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA L2 FW: Intra VDC Insertion

• ASA in either L2 or L3 mode, L2 is optimal in most cases

• Add VRFs on Cat 6500 or Nexus 7K for segmentation

• Server gateway inside of firewall

• Minimizes firewall failures, route around failures if needed

FW Outside FW Inside

Server GW

Single L2 Domain

Virtual Hosts

vlan 10vlan 20

10.199.199.210.199.199.1

Optional L3 path for FW bypassNexus 7K VDC

Nexus 7K VDC

Page 30: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

N7k1-VDC-2Aggregation

vrf1 vrf2

ASA L2 FW: Inter VDC Insertion

• Transparent (L2) firewall services are “sandwiched” between Nexus Virtual Device Contexts (VDC)

• Allows for other services (IPS, LB, etc) to be layered in as needed

• ASAs can be virtualized to for 1x1 mapping to VRFs

• Useful for topologies that require a FW between aggregation and core

• Firewalls could be L2 or L3

N7k1-VDC-1Core

vrf1 vrf2

Page 31: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Case Study: L2 Firewall Between Two L3 Devices• Stateful inspection point is required a L2 firewall between L3 links

• Firewall is processing at L2 (VLANs) while L3 services are unaffected if permitted by firewall access control list (ACL)

ISP-A

ISP-B

L3 Routed

Core Fully

Meshed BGP

Layer 3 point-to-point links

Routed core with fully meshed BGP

Transparent ASA

placement provides ACL

and stateful inspection

without disturbing existing

Layer 3 services

Internal

Network

ISP A

ISP B

Page 32: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Case Study: Transparent Firewall Logical View

Internal

Network

ISP A

ISP B

VLAN trunks “loop”

traffic through the

transparent firewalls

Failover control

link is a back-to-

back connection

Active/Standby

redundancy with

ASA failover

L3 Switch/Router

L3 Switch/Router

L3 Switch/Router

L3 Switch/Router

Active ASA

Standby ASA

Page 33: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Case Study: Transparent Firewall Traffic Flow

Inside VLAN 100

Outside VLAN 101

Outside

VLAN 101

192.168.0.3/29

Outside

VLAN 101

Internal

VLAN 200

192.168.0.4/29

1. Outbound

connection comes

in through inside

VLAN to SVI 100

192.168.0.1/29

192.168.0.2/29

SVI 100

SVI 100

2. Routing points to

192.168.0.3 as next hop,

passed through the

transparent ASA trunk

3. Connection passes

back through the switch at

Layer 2 toward the next

routed hop on outside

Page 34: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

FIREWALL VIRTUALIZATION:

Multiple Context Mode and ASAv

Page 35: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

• Multiple “virtual” firewalls operate concurrently on a single physical device

• Each such firewall is called a context, up to 250 contexts total

• Independent interface sets, policies, routing tables, management, and so on

• Inter-context routing via shared interfaces with virtual MAC addresses on ASA

• Commonly deployed in VRF environments at intersection points

• All contexts share limited hardware resources

• Some resources can be limited on per-context basis

• No VPN support except LAN-to-LAN tunnels in ASA 9.0+

ASA Multi Context Mode

Internet

PCI Vendor Corp

Single Physical

ASA Chassis

Page 36: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Resource Management

• You can limit the per-context usage of certain resources

• Management sessions, connections, xlates, inspects, syslogs, VPN, routes

• Both total counts and per-second rates could be limited

• Memory, CPU, interface rates, and other platform resources cannot be limited

• Limits are applied with resource classes:

asa(config)# class gold

asa(config-class)# limit-resource route 5000

asa(config-class)# context HR

asa(config-ctx)# member gold

%ASA-5-321001: Resource ‘routes' limit of 5000 reached for context ‘vfw1‘

Page 37: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

System Context:

Physical ports assigned

Configuring a Multiple Context ASA

• Context = a virtual firewall

• All virtualized firewalls must define a System context and an Admin context

• There is no policy inheritance between contexts

• The system space uses the Admin context for network connectivity

Admin Context:

Remote root access and

access to all contexts

Virtual Firewall

contexts

VFW

1

VFW

2

VFW

3

Admi

n

System

Page 38: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Multi Context Mode - Common Deployment

• Firewalls can be in transparent or routed mode or both (mixed mode 9.0+)

• Physical links are typically trunks but could be physical interfaces

• Contexts in routed mode can share VLANs, but not in transparent mode

VLAN 10 VLAN 20 VLAN 30 VLAN 40

VLAN 11 VLAN 21 VLAN 31 VLAN 41

VFW

1

VFW

2VFW

3VFW

4

Single Physical ASA

Page 39: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Multiple Context Mode – Segmentation

• One physical ASA

• Contexts could represent different tenants or VRF networks

• Contexts can be “stacked”

• Network devices can exist inside of protected enclave/zone/swim lane

• Creates separation via contexts

Security Services

Enclave/Zone/Swim Lane

Page 40: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Multiple Context Mode Configurationinterface Ethernet0/0

!

interface Ethernet0/0.1

vlan 10

!

interface Ethernet0/0.2

vlan 20

!

interface Ethernet0/1

!

interface Ethernet0/1.1

vlan 11

!

interface Ethernet0/1.2

vlan 21

!

interface Ethernet0/2

!

interface Ethernet0/3

!

class default

limit-resource All 0

limit-resource ASDM 5

limit-resource SSH 5

admin-context admin

context admin

allocate-interface Ethernet0/2 outside

allocate-interface Ethernet0/3 inside

config-url disk0:/admin.cfg

!

context vfw1

allocate-interface Ethernet0/0.1 outside-vfw1

allocate-interface Ethernet0/1.1 inside-vfw1

config-url disk0:/context1.cfg

!

context vfw2

allocate-interface Ethernet0/0.2 outside-vfw2

allocate-interface Ethernet0/1.2 inside-vfw2

config-url disk0:/context2.cfg

Page 41: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Multi Context Mode Configuration (Cont’d)

ciscoasa/vfw1 (config)# show run

ASA Version 9.0

!

hostname vfw1

enable password 8Ry2YjIyt7RRXU24 encrypted

!

interface inside-vfw1

nameif inside

security-level 100

ip address 172.17.1.1 255.255.255.0

!

interface outside-vfw1

nameif outside

security-level 0

ip address 10.2.2.1 255.255.255.0

Page 42: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Dynamic Routing in Multi-Context Mode

• Routed contexts support OSPFv2 and EIGRP in ASA 9.0(1)+

• BGP support in 9.2(1)

• Separate routing table, database, and adjacencies in each context

• OSPFv2 and EIGRP can be configured independently in each context

• OSPFv2 and EIGRP can both be configured in the same context

• 2 instances of OSPFv2 and 1 instance of EIGRP per context

• No inter-context peering through the shared interface

• Static inter-context routes are supported

• RIP, OSPFv3, and PIM are not supported in multi-context mode

Page 43: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

To Use Multi Context Mode or Not?

• Good fit for SPs who want to deploy a single appliance for multiple customers

• Good fit for VRF segmentation where VLANs map to VRFs

• Can’t virtualize CPU or memory, careful with network surges

• Can’t easily share interfaces in transparent (L2) mode

• Operationally more complex, management tools treat each context like a separate firewall

• Licensed feature $$$

• Some ASA features aren’t compatible with virtualization

• Can’t easily “reboot” a context

Page 44: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

What are North-South and East-West Flows?

• North-South (N-S) flows are typically flows to and from Access layer to Aggregation Layer and Core

• East-West (E-W) flows typically stay either within a zone or between zones and often server to server traffic

Web App

Access

Aggregation

Core

Database

East - West

No

rth

-S

ou

th

VirtualHosts

VirtualHosts

VirtualHosts

Page 45: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Where to Place the Firewall?• Centralized firewalls are the traditional

approach to virtualized host security

• Often a transitional architecture

• Firewalls in the core, aggregation or edge?

• Big challenge is scalability

• Usually the limiting factor is connections not bandwidth

• How to handle a requirement for L2 (micro)segmentation of hosts?

• How to address virtual host mobility? Hosts Hosts Hosts

Page 46: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Cisco’s Legacy Virtual Firewalls: VSG and ASA1000V• Cisco has two legacy virtual firewalls: the ASA 1000V and the Virtual Security

Gateway (VSG)

• Each runs as a virtual machine in VMWare

• Both are managed via Virtual Network Management Center (VNMC)

• Both are licensed per CPU socket

• They are complementary to each other and require the Nexus1000V Distributed Virtual Switch and utilize a new forwarding plane, vPath

Virtual Security Gateway ASA 1000V

ASA 1000V End-of-Sale

March 2015

Page 47: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

What is the Virtual Security Gateway?

• VSG is a L2 firewall that runs as a virtual machine “bump in the wire”

• It provides stateful inspection between L2 adjacent hosts (same subnet or VLAN)

• It can use VMware attributes for policy

• Provides benefits of L2 separation for East-West traffic flows

• One or more VSGs are deployed per tenant

• Requires Nexus 1000V dVS

Virtual Hosts

Virtual Hosts

Virtual Hosts

VSG Deployment Guide: http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps11208/deployment_guide_c07-647435.html

Page 48: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Evolution

Physical ASA

ASA 5500 and 5500-X family

ASA 1000V

Unique ASA Codebase

ASAv

Same codebase as Physical ASA

Clustering and Multiple Contexts

No L2 mode

No RA VPN

No Routing Protocols

Limited Features

2005 - Present 2012 2015

Page 49: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Introducing the Virtualized ASA (ASAv)

• Introduced with ASA 9.2 code release (April 2014)

• No Nexus1000V requirement

• Currently supported on Vmware vSphere (5.x) and KVM

• Has all ASA features with some exceptions

• No support for:

1. ASA clustering

2. Multi context mode (can’t virtualize a vm)

3. Etherchannel interfaces

4. Active/Active Failover (requires multi context mode)

ASAv Deployment Guide: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/intro-asav.html#pgfId-1156584

ASAv Firewall

(Virtualized ASA)

Page 50: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASAv: A Deeper Look

• Supports ALL features of hardware ASA except those noted previously

• Runs ASA 9.2+ code and features (same as physical ASA)

• Up to 10 interfaces

• Flexible licensing –based on vCPU usage, intended to simplify deployment, first ASA to get Smart Licensing feature

• Managed like a hardware ASA: CLI, ASDM or Cisco Security Manager (CSM) and REST API

• Cisco.com registered users can download ASAv for home use (limited to 100kbps and 2 VPN conns)

Page 51: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASAv: Deployment Best Practices

• Stateful Inspection at the edge or for inter-VM traffic

• Routed (L3) or transparent (L2) mode firewall

• Multi-tenant environments

• Cloud environments that require scalable, on demand, stateful access control or remote access VPN

• Where ASA1000V is deployed today

• Performance is based on underlying hardware: single ASAv consumes 1 vCPU and 2GB of RAM

• Requires VMware vCenter for deployment

Page 52: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Comparing Cisco Virtual Firewalls

ASAv Virtual Security Gateway

L2 and L3 mode L2 mode (transparent)

Dyn and static routing No routing

DHCP server and client

support

No DHCP support

S2S and RA VPN No IPSEC support

Managed via CLI, ASDM,

CSM

Managed by VNMC only

Full ASA code, CLI, SSH,

REST API

Minimal config via CLI, SSH

Page 53: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

FIREWALL HIGH AVAILABILITY

Page 54: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Firewall High Availability Options

• Like any other critical network device, firewalls must be deployed in a highly available manner

• This includes ports, links, data plane and control plane

• ASA Active/Standby failover has been the standard approach

• For: no single point of failure, stateful failover

• Against: Deployed only in pairs, no sharing of load

• ASA clustering provides unique advantages for elastic scaling

• BP: Interface redundancy at Layer 2 is optimal vs full switchover• No disruption for transit traffic on single link failure with logical interface bundles

• Device level switchover typically carries some convergence penalty

Page 55: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Interface Redundancy: Backup Interfaces

• Backup interfaces aggregate two physical interfaces as one logical interface

• No link aggregation, only L1 redundancy

• No disruption of service to upper layer protocols

• Single MAC and IP or bridge-group

• Can only be deployed in pairs

• Up to 8 pairs of redundant interfaces can be configured

interface redundant 1

member-interface tengigabitethernet 0/6

member-interface tengigabitethernet 0/7

nameif inside

ip address 10.1.1.2 255.255.255.0

Red line is active link

Black line is standby link

Page 56: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Interface Redundancy: Port Channels

• Best practice: Utilize Link Aggregation Control Protocol (LACP) where possible

• LACP dynamically adds and removes (if necessary) links to the port channel bundle

• Up to 8 active links in ASA 8.4+ and 16 active links in 9.2(1)+

• Link aggregation benefit

• Best practice in Nexus DC is to use Virtual Port Channels (vPC)

• Best practice: use LACP where possible

interface TenGigabitEthernet0/8

channel-group 40 mode active

no nameif

no security-level

!

interface TenGigabitEthernet0/9

channel-group 40 mode active

no nameif

no security-level

!

interface Port-channel40

nameif inside

ip add 10.1.1.2 255.255.255.0

Actively negotiate LACP with switch

Page 57: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

‘Show port-channel summary' on ASAFlags: D – down P - bundled in port-channel

I - stand-alone s – suspended

H - Hot-standby (LACP only)

U - in use N - not in use, no aggregation/nameif

M - not in use, no aggregation due to minimum links not met

w - waiting to be aggregated

Number of channel-groups in use: 1

Group Port-channel Protocol Span-cluster Ports

------+-------------+---------+------------+---------------------------

40 Po40 (U) LACP No Te0/8(P) Te0/9(P)

Page 58: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Virtual Port Channels (vPC) and the ASA

• Virtual Port Channels (vPC) are port channels where both links are actively forwarding traffic

• VPC was created to solve two inherent network problems: Spanning-tree recalculation times and unused capacity in redundant L2 uplinks (due to STP blocks)

• No additional config required on ASA

• Supported only with Nexus switches

• VPC Design Guide: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/C07-572830-00_Agg_Dsgn_Config_DG.pdf

Nexus 5K/7Ks

ASA

Page 59: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Port Channel Options and Summary

VPC PEER LINK

No Port Channel:

STP Allows only one active link

Sub-optimal flows and resource

usage

Single-Chassis LACP Port

Channel:

Both links active but no device

redundancy (single switch)

vPC Multi-Chassis LACP Port

Channel:

Both links active, optimal redundancy,

all links active

Slide courtesy of Mike Storm

Page 60: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

FAILOVER AND CLUSTERING

Page 61: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Active/Standby Failover

• A pair of identical ASA devices can be configured in Failover

• Data interface connections must be mirrored between the units with L2 adjacency

• IP and MAC addresses on data interfaces move with the active unit

• Centralized management from the active unit or context

• Stateful failover “mirrors” stateful conn table between peers

• Stateful failover makes Active/Active impractical for scaling

• Failover delivers high availability not scalability

Active

Firewall

(Primary)

Standby

Firewall

(Secondary)

HA

Interconnects

Page 62: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Two Types of ASA Failover

• Active/Standby Failover

• Single- or multiple-context mode

• Device-level switchover on failure

• One unit is always “idling”

• Simple design for single tenant

• Active/Active Failover

• Requires multiple-context mode

• Switchover based on context groups

• Both units are passing traffic

• Design caveats exist

Secondary

ASA

OutsideInside

Primary

Secondary

Inside B

Outside A

Inside A

Outside B

Primary

Secondary

A

A

B

B

Page 63: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Clustering For Scalable High Availability

• ASA Clustering was introduced in the 9.0 release (October 2012) to solve the problem of redundancy with scalability

• Allows for N+1 redundancy with a backup firewall for every active flow

• An ASA cluster is treated by the network as one logical firewall

• Configuration is synchronized among cluster members

• Three reasons to consider ASA Clustering:

1. Redundancy – no single point of failure, actively using all cluster members

2. Scalability – cluster can grow as requirements increase over time

3. Asymmetric flow reassembly – the cluster maintains symmetry for all conns

Page 64: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Clustering System Requirements

• All cluster members must have identical hardware configuration

• Up to 8 ASA5580/5585-X in ASA 9.0 and 9.1; up to 16 ASA5585-X in ASA 9.2(1)+

• Up to 2 ASA5500-X in ASA 9.1(4)+

• SSP types, application modules, and interface cards must exactly match

• Each ASA5580/5585-X member must have Cluster license installed

• Enabled by default on ASA5500-X except ASA5512-X without Security Plus

• 3DES and 10GE I/O licenses must match on all members

• Limited switch chassis support for control and data interfaces

• Catalyst 6500 with Sup32, Sup720, or Sup720-10GE and Nexus 7000 in ASA 9.0+

• Catalyst 3750-X and Nexus 5000 in ASA 9.1(4)+

• Nexus 9300 in 9.2(1)+

Page 65: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Clustering Scalability• Throughput scales at 70% of the aggregated capacity on average

• 16 ASA5585-X SSP-60 at 20Gbps → 224Gbps of Real World TCP throughput

• Scales at 100% with no traffic asymmetry between members

• Concurrent connections scale at 60% of the aggregated capacity

• 16 ASA5585-X SSP-60 at 10M → 96M concurrent connections

• Connections rate scales at 50% of the aggregated capacity

• 16 ASA5585-X SSP-60 at 350K CPS → 2.8M CPS

Page 66: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

CCL Best Practices

• Size and protect CCL appropriately

• Bandwidth should match maximum forwarding capacity of each member

• Use an LACP Etherchannel for redundancy and bandwidth aggregation

• 20Gbps of Real World traffic with ASA5585-X SSP-60 → 2x10GE CCL

• Dual-connect to different physical switches in vPC/VSS

• Cannot use service blade expansion interfaces for CCL

• Use interface cards for extra 10GE ports in ASA 9.1(2) and later

• Set MTU 100 bytes above largest data interface MTU

• Avoids fragmentation of redirected traffic due to extra trailer

• Ensure that CCL switches do not verify L4 checksums

• TCP and ICMP checksums for redirected packets look “invalid” on CCL

• Enable Spanning Tree Portfast and align MTU on the switch side

VPC

ASA Cluster

CCL CCL

Page 67: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Spanned Etherchannel Data Interface Mode• Mix transparent and routed firewalls contexts

• Must use Etherchannels: “firewall-on-a-stick” VLAN trunk or separate

• All units use the same virtual IP and MAC on each logical data interface

• Seamless load-balancing and unit addition/removal with cLACP

VPC 1ASA Cluster VPC 2inside

192.168.1.0/24

outside

172.16.125.0/24

.1

Te0/6

Te0/7

Te0/6

Te0/7

Te0/8

Te0/9

Te0/8

Te0/9

.1

Page 68: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Individual Data Interface Mode

• Routed firewall contexts only

• Master owns virtual IPs on data interfaces for management purposes only

• Use ECMP/PBR or dynamic routing protocols to load-balance traffic

• Members get data interface IPs from configured pools in the order of joining

• Per-unit Etherchannels support up to 16 members in ASA 9.2(1)+

VPC ASA Clusterinside

192.168.1.0/24

outside

172.16.125.0/24

.2

Te0/6

Te0/7

Te0/6

Te0/7

Te0/8

Te0/9

Te0/8

Te0/9

.2

.3.3

.1

.1

Master

Slave

Page 69: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Dynamic Routing and Clustering

• Master unit runs dynamic routing in Spanned Etherchannel mode

• RIP, EIGRP, OSPFv2, OSPFv3, BGP4 and PIM

• Routing and ARP tables are synchronized to other members like in failover

• Slower external convergence only on Master failure

• Each member forms independent adjacencies in Individual mode

• Same protocols as in Spanned Etherchannel, but multicast data is centralized as well

• Slower external convergence on any member failure

• Creative designs are possible with “split” clusters

• Reduce protocol timers on both sides to speed up convergenceasa/master(config)# interface GigabitEthernet0/0

asa/master(config-if)# ospf hello-interval 1

asa/master(config-if)# ospf dead-interval 2

asa/master(config-if)# router ospf 1

asa/master(config-router)# timers spf 1 1

Page 70: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Port Channel Verificationasa(cfg-cluster)# sh port-channel summary

Number of channel-groups in use: 2

Group Port-channel Protocol Span-cluster Ports

------+-------------+---------+-----------+--------------------

32 Po32(U) LACP Yes Te0/6(P) Te0/7(P)

40 Po40(U) LACP No Te0/8(P) Te0/9(P)

• PC 32 is the cluster data plane; PC 40 is the cluster control plane

• Note that CCL is not a “span-cluster” port-channel (best practice)

• Both are up as noted by the (U) and were negotiated via LACP

• The spanned port-channel will not come up until clustering is enabled

Page 71: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Unsupported ASA Features with Clustering

• SSL and IPSEC remote access VPN (Site to Site VPN is supported)

• Legacy VPN load balancing is not supported for S2S VPNs

• Botnet Traffic Filter (BTF)

• DHCP Client, Server and Relay

• Unified Communications features and inspection engines (SIP in 9.4)

• WCCP

• Some application inspection features (see Release Notes)

Page 72: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA AUTOMATION

Page 73: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

REST API on ASA

• Historically the ASA firewall has been managed via CLI or GUI (ASDM or Cisco Security Manager)

• Some customers use scripting tools to make programmatic changes

• Growing need on ASA platform to have a standards-based approach, especially combined with value of orchestration tools for virtual deployments

• REST is based upon client-server model over HTTPS, lightweight approach

• Allows for Create, Read, Update and Delete operations

• My blog post gives a general overview at:http://www.networkworld.com/article/2921386/security0/digging-deeper-into-the-cisco-asa-firewall-rest-api.html

Page 74: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

REST API on ASA - Continued• Requires REST

API agent to be installed on ASA and enabled

• Supported on both physical and virtual ASA (ASAv)

• Can use other methods for management

• Excellent docs console

Page 75: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Embedded Event Manager (EEM) (9.2)

• EEM is a subsystem that originated in IOS for automation

• On the ASA it allows programmatic responses to certain conditions (if-then) that are useful for debugging and long term troubleshooting

• Consists of two parts: events to which EEM listens and manager applets that define actions

• ASA EEM supports three types of events:

• Syslog – uses message ids as triggers

• Timers – Watchdog (periodic), Countdown (one-shot), Absolute (once-a-day)

• Crash – triggered when ASA is crashes

• Supported in routed and transparent mode; not supported in multicontext mode

Page 76: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ADVANCED ASA DEPLOYMENTS

Page 77: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Deploying ASA at Internet Edge with Routing

• OSPF v2/v3 and EIGRP

• BGP as of ASA 9.2+

• Both eBGP and iBGP, up to 500 peers

• Supported on ASAv

• Supported in Multi Context Mode

• Up to 100K routes

• BGP support with clustering (9.3)+

OSPF v2,v3

EIGRP

BGP

• ASA can act as a multi homed edge router and support VPN services concurrently

• VPN support could be for S2S IPSEC or Remote Access VPN or both

A/S pair

Page 78: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Should I Deploy ASA Clustering at the Internet Edge?

• ASA 9.1.4+ extends clustering to 5500-X family

• 2 units max

• 9.1.4 added support for 3750-X switch for this reason

• Yes, if you need Active/Active firewalls

• Yes, if you only need IPSEC S2S support and firewalling

• Yes, if you use OSPF, EIGRP or BGP

• No, if you require Remote Access VPN support

• No, if you require inspection engine support for multimedia protocols (SIP support in 9.4)

2 Unit cluster

Page 79: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA “Stacked” Clusters and Multi Context Mode

Physical Topology

• ASA clustering and multi context mode allow for complex deployment scenarios

• Topology on right shows 4 cluster members “stacked” on top of each other in the data center

• Network devices can be “sandwiched” in between virtualized clusters

• Asymmetric flow reassembly, etc.

Logical Topology

Page 80: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA Clusters and Multi Context Mode – Cont’d

• Same physical topology as previous slide

• This topology is where two separate access control policies are required, ASA clusters could be L2 or L3

• Physical cabling does not have to change (optional)

Context 1 Context 2 Context X

Page 81: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Clustering Across Multiple Data Centers• Until Dec 2013 ASA clustering was supported only in the same DC

• Increasingly customer requirements and interest were around spanning an ASA cluster across multiple DCs

• Geographically separated clusters are supported now with 9.1.4+ under these conditions:

• Dark “Media” CCL with less than 10ms of one way latency

• Routed (L3) firewall in individual interface mode only

• ASA 9.2 extends Inter-DC clustering to Spanned Etherchannel mode

• Transparent (L2) firewall only

• Only the CCL can be used via dark media or overlay method, not data plane

For a deeper dive see the BRKSEC-3021 session dedicated to ASA clustering

Page 82: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Split or Single Individual Mode Cluster in Inter DC

Data

CCL

CCL is fully extended between

DCs at L2 with <10ms of latency

ASA Cluster

CCL

Data

CCL CCL

Transit connections are not

contained to local site with

extended data VLANs

vPC 1 vPC 2

ASA 9.1(4)+

Local VPC/VSS

pairs at each site

Local VPC/VSS

pairs at each site

Data interfaces

connect to local

switch pair onlyData VLANs do not extend

with a split cluster to

localize traffic to site

Site BSite A

Page 83: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Extended Spanned Etherchannel Cluster in Inter DC

Data CCL DataCCL

vPC Peer Link

vPC logical switch pair is

stretched across sites

CCL is fully extended between

DCs at L2 with <10ms of latency

ASA Cluster

All data interfaces bundle into a

single Spanned Etherchannel

Each cluster member can

single- or dual-connect to

the VSS/vPC pair for CCL

and Data

Transit connections are not

contained to the local site

ASA 9.2+

Site BSite A

Page 84: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Split Spanned Etherchannel Cluster in Inter DC

DataCCL

CCL is fully extended between

DCs at L2 with <10ms of latency

ASA Cluster

CCL DataCCL CCL

Data VLANs are not

extended to prevent loopsvPC 1 vPC 2

Local VPC/VSS

pairs at each site

Local VPC/VSS

pairs at each site

Single Spanned

Etherchannel for Data

on cluster sideLocal Data

Etherchannels on

each VPC/VSS

switch pair

Local Data

Etherchannels on

each VPC/VSS

switch pair

ASA 9.2+

Site BSite A

Page 85: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Route an IP address or prefix to the bit bucket at the network edge

Prevent malicious traffic from entering the secure network and consuming resources

Destination blocking temporarily drops all traffic to a protected resource until the attack stops

Source blocking drops all traffic from a malicious host or subnet at the perimeter

Basic routing features propagate a drop rule across administrative domains

Ability to set an arbitrary next-hop in BGP, Null0 static routes, and Reverse Path Forwarding (RPF)

Trigger device injects the rule into iBGP routing domain, blocking router drops traffic based on rule

ASA can operate as the trigger or blocking device with BGP in 9.2+

Remotely Triggered Black Holes (RTBH)

Page 86: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

RTBH Trigger on ASA Example

PE

ip verify unicast source reachable-via any

interface Null0

no ip unreachables

router bgp 65001

neighbor 192.168.1.1 remote-as 65001

ip route 192.0.2.1 255.255.255.255 Null0

route-map RTBH

set ip next-hop 192.0.2.1

set origin igp

set community no-export

router bgp 65001

neighbor 192.168.100.1 remote-as 65001

redistribute static route-map RTBH

route Null0 10.1.1.1 255.255.255.255

Create a route map to set the

next hop for any matching

advertised routes to the

“blackhole” IP address

Redistribute all static routes using

the route map for blackholing

10.1.1.1

Any traffic recursively routed to the

blackhole IP address will be dropped

“Soft” uRPF ensures that each source

IP address has a valid return route

3. Subsequent packets from

10.1.1.1 are dropped at the

Provider Edge router

Advertise a static route to the

attacker using the route-map

BGP

1. Establish BGP peering

between inside ASA and

perimeter router with RTBH

configuration

2. ASA administrator

identifies 10.1.1.1 as a

malicious host, configures a

block rule

Page 87: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Segmentation with ASA

Page 88: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Network (Micro)Segmentation with Cisco Firewalls

• VLANs were an early and still the most common tool to segment the network into smaller units

• ASA in transparent mode was designed for this purpose (VLAN stitching), but L2 domains are still shared

• Virtual Security Gateway (VSG) was designed for E-W traffic (micro)segmentation within the same L2 domain

• VxLAN and Security Group Tags (SGTs) provide segmentation options

Page 89: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Layer 2 VLANs create challenges in virtual and cloud infrastructure

Virtual eXtensible LAN (VxLAN) provides scale and flexibility

Up to 16M logical network segments vs 4096 VLANs

Ethernet frames from endpoints are carried in UDP over Layer 3

Virtual Tunnel Endpoint (VTEP) interfaces terminate VxLAN connections

Useful for inserting an external firewall between virtual segments

VxLAN Overview

Page 90: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA 9.4 supports one VTEP with multiple tunnels per context

System VLAN limit applies to combined VLAN and VxLAN count

ASA as VxLAN Gateway

VxLAN 10000

VxLAN 10200

VxLAN 10100

VLAN 100

TenGig0/8

One static VTEP peer

(i.e. hypervisor) is

supported on ASA

interface vni1

segment-id 10000

interface vni2

segment-id 10100

interface vni3

segment-id 10200

Multiple VTEP peers

require multicast-

based discovery

A Virtual Network Identifier (VNI) interface on

ASA handles decapsulated VxLAN traffic for

each segment

ASA bridges or routes

between different

network types

Page 91: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Secure Segmentation with ASA

Compute servers and ASA

can be separated by a

routed infrastructure.

Combine hosts with a

similar security role into

a single VxLAN across

multiple compute

servers.Extend all VxLAN segments into

the ASA (virtual or physical) for

secure segmentation. Routed

mode scales best.

Page 92: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Routed Mode VxLAN Gateway

ASA and its peers use unicast

and multicast IPv4 UDP to

communicate between “outer”

VTEP interfaces.

10.20.20.101 10.10.10.201

VMs send IPv4/IPv6 packets over

the VxLAN toward “inner” default

gateway VNI on the ASA.

VTEP encapsulates ARP into multicast

to identify the peer for a particular

destination endpoint (MAC address).

Page 93: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

What are Security Group Tags (SGTs)?

• SGTs are metadata carried in a L2 header

• Think of it like a global ACL that all devices can share

• Addresses two issues:1. The lack of scalability of ACLs on multiple network devices

2. The ability to combine identity and access control in a single package

• Built upon a principle that traffic is tagged at the edge and network devices enforce a global, consistent access policy throughout the network, network devices share policy information via SGTs

• TrustSec is the marketing name for SGACLs, 802.1x and Identity networking

Page 94: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

SGT eXchange Protocol (SXP)

• SGTs are implemented in hardware

• VPN authorization result from ISE

• Can be assigned via 802.1x, MAB or static

• SXP is a mechanism where devices can pull or push IP to SGT mappings from a native SGT device

• ASA supports SXP as a listener and a speaker

Page 95: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Creating an SGT Access Control Policy

• ASA became SGT aware in 9.0 release

• Does not require the whole infrastructure to support SGTs

• ASA converts SGTs to IP addresses

• RA VPN users are tagged on ingress

Permit PCI devices to talk to PCI devices regardless of IP address

Page 96: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

SGFW Rules Table View

• Standard ACE rules (both IPv4 and IPv6) and SGFW rules are all combined in the same rules table

Page 97: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Data Center Segmentation with Security Group Tags

Web

Servers

Database

Servers

Middleware

ServersStorage

ASA SGFW

Page 98: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

IPv6

Page 99: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

IPv6 and Cisco Firewalls

• Virtual Security Gateway supports IPv6

• ASA code has supported IPv6 for many years and 9.0 release augments IPv6 features (ASA and ASASM)

• Very little performance hit with IPv6

• AnyConnect IPSEC VPN also support IPv6

• ASDM supports IPv6 addresses

• NAT46 and 64 support on ASA

• Works with Security Group Tags (IPv4 and IPv6)

Page 100: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Unified IPv4 and IPv6 ACLs

• Older ASA software used separate IPv4 and IPv6 interface ACLs:

• ASA 9.0 and newer uses a single ACL for all IPv4 and IPv6

• Configuration migration from earlier releases:

• Dual interface ACLs are merged

• Contextual any conversion applies to ACLs only

access-list IN extended permit ip host 10.1.1.1 any4

access-list IN extended permit ip host 2001::1 any6

access-list IN extended permit ip host 10.1.1.1 host 2001:DB8::10

access-list IN extended permit ip any any

Any IPv4

Any IPv6

Any IPv4 or IPv6

Mixed IPv4 and IPv6

(Need NAT)

access-list INSIDE_IPV4 extended permit ip host 10.1.1.1 any

ipv6 access-list INSIDE_IPV6 permit ip host 2001:DB8:1 any

access-group INSIDE_IPV4 in interface inside

access-group INSIDE_IPV6 in interface inside

“Any” depends on

the ACL type

Slide courtesy of Andrew Ossipov

Page 101: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASA IPv6 Best Practices

ipv6 access-list outsideACL permit icmp6 host fe80::21e:7bff:fe10:10c any router-advertisement

ipv6 access-list outsideACL deny icmp6 any any router-advertisement

access-group outsideACL in interface outside

interface vlan2

nameif outside

security-level 0

ipv6 address autoconfig

ipv6 enable

• ACL to block unknown Router Advertisement (RA)

• Suppress ASA interface Router Advertisements

interface vlan2

ipv6 nd suppress-ra

https://supportforums.cisco.com/docs/DOC-15973

Page 102: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

SUMMARY AND PARTING THOUGHTS

Page 103: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Summary and Parting Thoughts

• Firewall deployment is not as simple as it used to be (to route or not to route?)

• ASAv should be used where ASA1000V is present today

• Virtualized firewalls (multi context mode) provide a nice option for segmented networks (VRF Lite, MPLS, etc) and/or decentralized management

• Firewall clustering offers advantages over the traditional A/S model especially if interested in InterDC deployment

• ASA L2 mode offers interesting opportunities for non-disruptive deployment

• The ASA has robust IPv6 capabilities

• Leverage Cisco Validated Designs (CVDs) as a best practice

Page 104: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Participate in the “My Favorite Speaker” Contest

• Promote your favorite speaker through Twitter and you could win $200 of Cisco Press products (@CiscoPress)

• Send a tweet and include

• Your favorite speaker’s Twitter handle CiscoDCSecurity

• Two hashtags: #CLUS #MyFavoriteSpeaker

• You can submit an entry for more than one of your “favorite” speakers

• Don’t forget to follow @CiscoLive and @CiscoPress

• View the official rules at http://bit.ly/CLUSwin

Promote Your Favorite Speaker and You Could be a Winner

Page 105: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Complete Your Online Session Evaluation

Don’t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online

• Give us your feedback to be entered into a Daily Survey Drawing. A daily winner will receive a $750 Amazon gift card.

• Complete your session surveys though the Cisco Live mobile app or your computer on Cisco Live Connect.

Page 106: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Continue Your Education

• Demos in the Cisco Campus

• Walk-in Self-Paced Labs

• Table Topics

• Meet the Engineer 1:1 meetings

Page 107: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Thank you

Page 108: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific
Page 109: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ADDITIONAL SLIDES

Page 110: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Failover Interfaces

• Failover Control Link is vital to the health of a Failover pair

• Carries bi-directional control, keepalive, and configuration messages

• Dedicated interface of each unit should connect to an isolated secure network

• Back-to-back cable connections with a Redundant interface for most protection

• Failover is disabled when Failover Control Link connectivity is interrupted

• State Link latency should be <10ms and must be <200ms

• Data interface monitoring requires Standby IP addresses

• Each unit monitors the health of its interfaces and compares with the peer

• Active virtual MAC address is inherited from the physical interface of the primary

failover lan interface FOVER_CONTROL GigabitEthernet0/0

ip address 192.168.1.11 255.255.255.0 standby 192.168.1.12

failover link FOVER_STATE GigabitEthernet0/1

Page 111: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASAv and VSG Compared

ASAv with 4 vCPU Virtual Security Gateway

Throughput 1-2GB stateful vPath

Max Concurrent

Sessions500,000 256,000

Max Conns/Sec 60,000 6K-10K (1vCPU/2vCPU)

S2S VPN Sessions 750 NA

AnyConnect® Sessions 750 NA

Page 112: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

VM Attributes Used by VSG (Partial List)

Name Meaning Source

vm.name Name of this VM vCenter

vm.host-name Name of this ESX-host vCenter

vm.os-fullname Name of guest OS vCenter

vm.vapp-name Name of the associated

vApp

vCenter

vm.cluster-name Name of the cluster vCenter

vm.portprofile-name Name of the port-profile Port-profile

Page 113: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

ASAv and VSG – 3 Tier Server Zone

Web Zone Database Application

VM 1

VM 2

VM 3

VM 4

VM 1

VM 2

VM 3

VM 4

VM 1

VM 2

VM 3

VM 4

NAT pool

ASAv Policy: Block any external web access to DB servers

ASAv Policy: Allow only tcp/80 to Web Zone

VSG: Only permit Web Zone to access DB Zone

VSG: Permit App Zone to access Web Zone but not DB

Te

na

nt

1

Tenant

1

Web client

Page 114: Firewall Architectures - d2zmdbbm9feqrf.cloudfront.netd2zmdbbm9feqrf.cloudfront.net/2015/usa/pdf/BRKSEC-2021.pdf · Firewall Architectures Mason Harris CCIE # 5916 ... • Specific

Using Identity and SG ACLs

• All entries still require IP information (could be any)

• Identity for source only; SG Tags and Names can be source or destination

• Names must resolve to tags, groups to users, user to IP addresses

• Syslogs show Users, Tags and Names when possible

access-list IN permit ip security-group name HR_ADMIN host 10.1.1.1 any

access-list IN permit ip user ABCD\John any security-group tag 22 any

From HR_ADMIN

group on 10.1.1.1

To any

destination

From AD user

ABCD/John

anywhere

To any IP

with tag 22

%ASA-6-302013: Built outbound TCP connection 16 for outside:198.51.100.100/22

(198.51.100.100/22)(ABCD\Mary, 111:MKTG) to inside:10.0.0.2/20898 (10.0.0.2/20898)(1212)